Abstract | ||
---|---|---|
Traditional authentication protocols are based on cryptographic techniques to achieve identity verification. Distance bounding protocols are an enhanced type of authentication protocol built upon both signal traversal time measurement and cryptographic techniques to accomplish distance verification as well as identity verification. A distance bounding protocol is usually designed to defend against the relay attack and the distance fraud attack. As there are applications to which the distance fraud attack is not a serious threat, we propose a streamlined distance bounding protocol that focuses on the relay attack. The proposed protocol is more efficient than previous protocols and has a low false acceptance rate under the relay attack. |
Year | DOI | Venue |
---|---|---|
2012 | 10.1587/transinf.E95.D.1155 | IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS |
Keywords | Field | DocType |
security, authentication, relay attack, mafia fraud attack, distance bounding protocol | Relay attack,Authentication,Computer science,Challenge–response authentication,Cryptography,Computer network,Pre-play attack,Authentication protocol,Distance-bounding protocol,Reflection attack | Journal |
Volume | Issue | ISSN |
E95D | 4 | 1745-1361 |
Citations | PageRank | References |
4 | 0.41 | 5 |
Authors | ||
5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Jin Seok Kim | 1 | 56 | 6.25 |
Kookrae Cho | 2 | 11 | 2.61 |
Dae Hyun Yum | 3 | 315 | 24.95 |
Sung Je Hong | 4 | 267 | 28.92 |
Pil Joong Lee | 5 | 1039 | 103.09 |